Happy Data Privacy Day!

WHAT ARE YOU DOING TO OBSERVE IT? Today is Data Privacy Day! If you have been wondering “what is Data Privacy Day?” then this is your lucky day because not only is today Data Privacy Day, but here is the answer and an explanation for why it really matters to you and your company’s future … Continue reading Happy Data Privacy Day!

The Most Positive Cybersecurity Trend I Have Seen in Nearly 20 Years!

In the last quarter of 2017, I have observed a cybersecurity trend that has given me more hope than any that I have seen previously. Let me explain. As an attorney, I have been practicing what can generally be described as cyber law or cybersecurity law since 1999, which means that my practice has evolved a lot … Continue reading The Most Positive Cybersecurity Trend I Have Seen in Nearly 20 Years!

Tips for Staying #CyberSecure While Shopping Online for #CyberMonday

Cybercriminals need shopping money for the Holidays and one of their favorite times to get yours is when you are shopping on #CyberMonday. https://youtu.be/ZPIEiQVQZ2I?t=31s Use these tips to help stay #cybersecure while shopping online for #CyberMonday and at any other time: Credit or debit? Use credit cards, not debit cards, for your online shopping. Debit cards … Continue reading Tips for Staying #CyberSecure While Shopping Online for #CyberMonday

FUD and Voting Machine Hacking: An Important Point and Important Lesson

This morning I am doing radio interviews as a Fox News Radio contributor. My topic? The DEFCON Voting Village demonstration of hacking voting machines that have been, or may currently be, used in US elections. Here are a couple of the news stories if you are unfamiliar: Hacking a US electronic voting booth takes less than … Continue reading FUD and Voting Machine Hacking: An Important Point and Important Lesson

OCR Issues Cyberattack Response Checklist and Infographic

The United States Department of Health and Human Services' Office for Civil Rights has just issued a checklist and infographic to aid healthcare organizations and their vendors in quickly responding to cyberattacks in compliance with HIPAA requirements.